31
ISAT 615 ISAT 615 1 ISAT 615 ISAT 615 Cyber Ethics Cyber Ethics By By Drs. Alkadi & Acosta Drs. Alkadi & Acosta

MELJUN CORTES Cyber Ethics

Embed Size (px)

DESCRIPTION

MELJUN CORTES Cyber Ethics

Citation preview

Page 1: MELJUN CORTES Cyber Ethics

ISAT 615ISAT 615 11

ISAT 615ISAT 615

Cyber EthicsCyber Ethics

ByBy

Drs. Alkadi & AcostaDrs. Alkadi & Acosta

Page 2: MELJUN CORTES Cyber Ethics

ISAT 615 2

Cyber EthicsCyber Ethics

The majority of the slides were taken from The majority of the slides were taken from the book, “Cyber Ethics” by Halbert Ingulli, the book, “Cyber Ethics” by Halbert Ingulli, which is referenced later.which is referenced later.

For more information, go to:For more information, go to:

http://halbert.westbuslaw.comhttp://halbert.westbuslaw.com

Page 3: MELJUN CORTES Cyber Ethics

ISAT 615 3

Intellectual Property & CyberspaceIntellectual Property & Cyberspace

If seven million people are stealing, they aren’t stealing.If seven million people are stealing, they aren’t stealing.David Post, Prof. of law, Temple Univ.David Post, Prof. of law, Temple Univ.

Today’s Internet pirates try to hide behind some contrived Today’s Internet pirates try to hide behind some contrived New Age arguments of cyberspace, but all they are really New Age arguments of cyberspace, but all they are really doing is trying to make a case for Age Old Thievery. When doing is trying to make a case for Age Old Thievery. When they hack a DVD and then distribute it on the web, it is no they hack a DVD and then distribute it on the web, it is no different that if someone puts a quarter in a newspaper different that if someone puts a quarter in a newspaper machine and then takes out all the papers, which of course machine and then takes out all the papers, which of course would be illegal and morally wrong.would be illegal and morally wrong.

Michael Eisner, Chairman & CEO, The Walt Disney CompanyMichael Eisner, Chairman & CEO, The Walt Disney Company

Page 4: MELJUN CORTES Cyber Ethics

ISAT 615 4

Ethics Case: NapsterEthics Case: Napster Is it ethical to listen to as many times as you want a song that you Is it ethical to listen to as many times as you want a song that you

didn’t buy?didn’t buy? You will probably send it to a dozen of your closest fiends and You will probably send it to a dozen of your closest fiends and

relatives.relatives. Napster operates on a (P2P) computing model. Users who have Napster operates on a (P2P) computing model. Users who have

downloaded the free S/W from its site can then access the directory of downloaded the free S/W from its site can then access the directory of available music and add tunes of their own. Napster’s server is an available music and add tunes of their own. Napster’s server is an intermediary, allowing one user to reach the files of another.intermediary, allowing one user to reach the files of another.

In other words, you are able to broadcast your request to millions of In other words, you are able to broadcast your request to millions of other music lovers in the Napster’s community.other music lovers in the Napster’s community.

Does anyone else have this CD on their PC, are they online?Does anyone else have this CD on their PC, are they online? What happened to Napster?What happened to Napster?

http://archives.cnn.com/2001/LAW/02/20/napster.settlement.03/http://archives.cnn.com/2001/LAW/02/20/napster.settlement.03/

Page 5: MELJUN CORTES Cyber Ethics

ISAT 615 5

Intellectual Property LawIntellectual Property Law

Our legal system has developed ways of protecting intellectual Our legal system has developed ways of protecting intellectual property.property.

Congress passed copyrights, patent and trademark laws.Congress passed copyrights, patent and trademark laws. What is protected is the expression of an idea, not the idea itself.What is protected is the expression of an idea, not the idea itself. This follows from the high value we place on freedom of speech and This follows from the high value we place on freedom of speech and

expression.expression. Copyright law protects the tangible expression of an idea from being Copyright law protects the tangible expression of an idea from being

reproduced without the permission of the copyright holder.reproduced without the permission of the copyright holder. A copyrighted work of art must be original, and created independently A copyrighted work of art must be original, and created independently

by the artist.by the artist. The law curbs this right, making it last only for a set time period.The law curbs this right, making it last only for a set time period. It also permits reproduction of portions of copyrighted work for limited It also permits reproduction of portions of copyrighted work for limited

work such as criticism or classroom instruction.work such as criticism or classroom instruction. Visit Visit http://www.copyright.govhttp://www.copyright.gov

Page 6: MELJUN CORTES Cyber Ethics

ISAT 615 6

Page 7: MELJUN CORTES Cyber Ethics

ISAT 615 7

Ten Commandments Of Computer EthicsTen Commandments Of Computer EthicsCreated by the Computer Ethics InstituteCreated by the Computer Ethics Institute

1.Thou Shalt Not Use A Computer To Harm Other People.1.Thou Shalt Not Use A Computer To Harm Other People. 2.Thou Shalt Not Interfere With Other People’s Computer 2.Thou Shalt Not Interfere With Other People’s Computer

Work.Work. 3.Thou Shalt Not Snoop Around In Other People’s 3.Thou Shalt Not Snoop Around In Other People’s

Computer Files.Computer Files. 4.Thou Shalt Not Use A Computer To Steal.4.Thou Shalt Not Use A Computer To Steal. 5.Thou Shalt Not Use A Computer To Bear False Witness.5.Thou Shalt Not Use A Computer To Bear False Witness. 6.Thou Shalt Not Copy Or Use Proprietary Software For 6.Thou Shalt Not Copy Or Use Proprietary Software For

Which You have Not Paid.Which You have Not Paid. 7.Thou Shalt Not Use Other People’s Computer Resources 7.Thou Shalt Not Use Other People’s Computer Resources

Without Authorization Or Proper Compensation.Without Authorization Or Proper Compensation.

Page 8: MELJUN CORTES Cyber Ethics

ISAT 615 8

Ten Commandments Of Computer EthicsTen Commandments Of Computer EthicsContinuedContinued

8.Thou Shalt Not Appropriate Other People’s Intellectual 8.Thou Shalt Not Appropriate Other People’s Intellectual Output.Output.

9.Thou Shalt Think About The Social Consequences Of 9.Thou Shalt Think About The Social Consequences Of The Program You Are Writing Or The System You Are The Program You Are Writing Or The System You Are Designing.Designing.

10.Thou Shalt Always Use A Computer In Ways That 10.Thou Shalt Always Use A Computer In Ways That Insure Consideration And Respect For Your Fellow Insure Consideration And Respect For Your Fellow Humans.Humans.

http://www.brook.edu/its/cei/overview/Ten_Commanments_of_Computer_Ethics.htmhttp://www.brook.edu/its/cei/overview/Ten_Commanments_of_Computer_Ethics.htm

Page 9: MELJUN CORTES Cyber Ethics

ISAT 615 9

Page 10: MELJUN CORTES Cyber Ethics

ISAT 615 10

Workplace SurveillanceWorkplace Surveillance

90% of all companies with more than 1,000 employees 90% of all companies with more than 1,000 employees currently use e-mail.currently use e-mail.

Sixty billion messages are sent annually.Sixty billion messages are sent annually. Employees are under the impression that their messages Employees are under the impression that their messages

are private.are private. Old and deleted messages are archived and easily Old and deleted messages are archived and easily

accessible by the management.accessible by the management. In the US there is no comprehensive, uniform legal In the US there is no comprehensive, uniform legal

standard protecting privacy.standard protecting privacy. http://www.PrivacyExchange.orghttp://www.PrivacyExchange.org

Page 11: MELJUN CORTES Cyber Ethics

ISAT 615 11

Page 12: MELJUN CORTES Cyber Ethics

ISAT 615 12

Interesting QuotesInteresting Quotes

I find the information age to be a healthy thing…the more I find the information age to be a healthy thing…the more you know about somebody else, the better off everybody you know about somebody else, the better off everybody is.is.

Owner of personal database companyOwner of personal database company

There is the possibility of becoming an even more satisfied There is the possibility of becoming an even more satisfied society based on unequal access to information in which society based on unequal access to information in which individuals live in glass houses, while the external walls of individuals live in glass houses, while the external walls of large corporations are one-way mirrors.large corporations are one-way mirrors.

Gary T. Marx, Professor of Sociology, MITGary T. Marx, Professor of Sociology, MIT

Page 13: MELJUN CORTES Cyber Ethics

ISAT 615 13

Government Regulation Vs. Industry Government Regulation Vs. Industry Self-PolicingSelf-Policing

In 1998, several major companies such as, IBM, HP, AOL In 1998, several major companies such as, IBM, HP, AOL and MS formed the Online Privacy Alliance (OPA).and MS formed the Online Privacy Alliance (OPA).

The Website is:The Website is: http://www.privacyalliance.comhttp://www.privacyalliance.com The AOL incident in 1998 stepped up the self-policing on The AOL incident in 1998 stepped up the self-policing on

the part of businesses to protect themselves against the part of businesses to protect themselves against lawsuits.lawsuits.

It has forced AOL to revise its privacy policy in 1999.It has forced AOL to revise its privacy policy in 1999. MS and IBM announced that their companies would pull MS and IBM announced that their companies would pull

their advertising from Websites that failed to post privacy their advertising from Websites that failed to post privacy policies in sync with their own.policies in sync with their own.

Page 14: MELJUN CORTES Cyber Ethics

ISAT 615 14

Page 15: MELJUN CORTES Cyber Ethics

ISAT 615 15

What Cyberspace Knows About YouWhat Cyberspace Knows About You

If you go to If you go to http://www.cdt.orghttp://www.cdt.org you will learn how much you will learn how much government and employers can discover about you.government and employers can discover about you.

Go to Go to http://www.aclu.org/privacyhttp://www.aclu.org/privacy and and you will find that a you will find that a lot of information about you could be available to anyone.lot of information about you could be available to anyone.

Spy Technology has become increasingly sophisticated, Spy Technology has become increasingly sophisticated, check out some of the sites that retail surveillance check out some of the sites that retail surveillance technology:technology:

http://www.intercept-spytech.comhttp://www.intercept-spytech.com

http://eaglevision1.comhttp://eaglevision1.com

Page 16: MELJUN CORTES Cyber Ethics

ISAT 615 16

Page 17: MELJUN CORTES Cyber Ethics

ISAT 615 17

Page 18: MELJUN CORTES Cyber Ethics

ISAT 615 18

Page 19: MELJUN CORTES Cyber Ethics

ISAT 615 19

Page 20: MELJUN CORTES Cyber Ethics

ISAT 615 20

Big Brother in CyberspaceBig Brother in Cyberspace

The government is doing its part in educating Internet The government is doing its part in educating Internet users especially our most valuable asset, our kids.users especially our most valuable asset, our kids.

Go to:Go to:

http://www.cybercrime.gov/links1.htmhttp://www.cybercrime.gov/links1.htm

and select the following link:and select the following link:

Safety Tips for Kids on the Internet from the Federal BureaSafety Tips for Kids on the Internet from the Federal Bureau of Investigationu of Investigation

This is a hyperlink to the following:This is a hyperlink to the following:http://www.fbi.gov/publications/pguide/pguidee.htmhttp://www.fbi.gov/publications/pguide/pguidee.htm

Page 21: MELJUN CORTES Cyber Ethics

ISAT 615 21

Page 22: MELJUN CORTES Cyber Ethics

ISAT 615 22

Page 23: MELJUN CORTES Cyber Ethics

ISAT 615 23

Medical PrivacyMedical Privacy In his book, In his book, The Limits of Privacy, The Limits of Privacy, Amitai Etzioni says “Amitai Etzioni says “it’s it’s

Big Bucks we need to worry about, not Big government.Big Bucks we need to worry about, not Big government.”” Etzioni continues that in 1996, 35% of the Fortune 500 Etzioni continues that in 1996, 35% of the Fortune 500

companies acknowledged that they draw on personal companies acknowledged that they draw on personal health information in making employment decisions.health information in making employment decisions.

These companies employ millions of people.These companies employ millions of people. Kathleen A. Frawley, VP of the American Health Info. Kathleen A. Frawley, VP of the American Health Info.

Mgmt. Assoc. says “Mgmt. Assoc. says “There is a whole market of people buying and There is a whole market of people buying and selling medical information.selling medical information.””

A.G. Breitenstein, Health Law Institute Director, said, A.G. Breitenstein, Health Law Institute Director, said, ““People are not going to go to feel comfortable going to the doctor, b/c People are not going to go to feel comfortable going to the doctor, b/c now you are going to have a permanent record that will follow you now you are going to have a permanent record that will follow you around for the rest of your life that says you have syphilis, or around for the rest of your life that says you have syphilis, or depression, or an abortion or whatever else.” depression, or an abortion or whatever else.”

Page 24: MELJUN CORTES Cyber Ethics

ISAT 615 24

The Library Bills of RightsThe Library Bills of Rights

I.I. Books and other library resources should be provided for the interest, Books and other library resources should be provided for the interest, information, and enlightenment of all people of the community the library information, and enlightenment of all people of the community the library serves. Materials should not be excluded because of the origin, background, serves. Materials should not be excluded because of the origin, background, or views of those contributing to their creation.or views of those contributing to their creation.

II.II. Libraries should provide materials and information presenting all points of Libraries should provide materials and information presenting all points of view on current and historical issues. Materials should not be proscribed or view on current and historical issues. Materials should not be proscribed or removed because of partisan or doctrinal disapproval.removed because of partisan or doctrinal disapproval.

III.III. Libraries should challenge censorship in the fulfillment of their responsibility to Libraries should challenge censorship in the fulfillment of their responsibility to provide information and enlightenment.provide information and enlightenment.

IV.IV. Libraries should cooperate with all persons and groups concerned with Libraries should cooperate with all persons and groups concerned with resisting abridgment of free expression and free access to ideas.resisting abridgment of free expression and free access to ideas.

V.V. A person’s right to use a library should not be denied or abridged because of A person’s right to use a library should not be denied or abridged because of origin, age, background, or views.origin, age, background, or views.

VI.VI. Libraries which make exhibit spaces and meeting rooms available to the Libraries which make exhibit spaces and meeting rooms available to the public they serve should make such facilities available on an equitable basis, public they serve should make such facilities available on an equitable basis, regardless of the beliefs or affiliations of individuals or groups requesting their regardless of the beliefs or affiliations of individuals or groups requesting their use.use.

Page 25: MELJUN CORTES Cyber Ethics

ISAT 615 25

Page 26: MELJUN CORTES Cyber Ethics

ISAT 615 26

QuestionsQuestions

Should children be protected from offensive Should children be protected from offensive online speech? Should adults?online speech? Should adults?

Who should do the protecting: Government? Who should do the protecting: Government? Schools? Public Libraries? Parents?Schools? Public Libraries? Parents?

Page 27: MELJUN CORTES Cyber Ethics

ISAT 615 27

Internet AnonymityInternet Anonymity

In 1997, in ACLU v. Reno the supreme court noted that the In 1997, in ACLU v. Reno the supreme court noted that the Internet “Internet “provides relatively unlimited low-cost capacity for provides relatively unlimited low-cost capacity for communication of all kinds. This dynamic, multifaceted communication of all kinds. This dynamic, multifaceted category of communication includes not only traditional category of communication includes not only traditional print and news service, but also audio, video, and still print and news service, but also audio, video, and still images, as well as interactive, real-time dialogue. Through images, as well as interactive, real-time dialogue. Through the use of chat rooms, any person with a phone line can the use of chat rooms, any person with a phone line can become a town crier with a voice that resonates farther become a town crier with a voice that resonates farther than it could from any soapbox. Through the use of Web than it could from any soapbox. Through the use of Web pages, mail exploders, and newsgroups, the same pages, mail exploders, and newsgroups, the same individual can become pamphleteer.”individual can become pamphleteer.”

Page 28: MELJUN CORTES Cyber Ethics

ISAT 615 28

Internet Anonymity Cont’d.Internet Anonymity Cont’d.

The Supreme Court goes on to say, “The Supreme Court goes on to say, “Anonymity is Anonymity is a shield from the tyranny of the majority. …It thus a shield from the tyranny of the majority. …It thus exemplifies the purpose behind the Bill of Rights, exemplifies the purpose behind the Bill of Rights, and of the First Amendment in particular: to protect and of the First Amendment in particular: to protect unpopular individuals from retaliation– and their unpopular individuals from retaliation– and their ideas from suppression– at the hand of an ideas from suppression– at the hand of an intolerant society.” intolerant society.”

What do you think about the Supreme Court’s What do you think about the Supreme Court’s stance?stance?

Page 29: MELJUN CORTES Cyber Ethics

ISAT 615 29

Democracy and the InternetDemocracy and the Internet

I’m very optimistic about the role of human beings in the Information I’m very optimistic about the role of human beings in the Information Age, because this is an era where people – their knowledge, and their Age, because this is an era where people – their knowledge, and their ability to put that knowledge to work – will be more important than ever ability to put that knowledge to work – will be more important than ever before. … The Information Age is enabling people who were previoulsy before. … The Information Age is enabling people who were previoulsy forced to pursue a single means of wealth creation –those, for forced to pursue a single means of wealth creation –those, for example, who lived in remote areas had no option but to work on the example, who lived in remote areas had no option but to work on the land – to choose from a far wide range of work. Technology such as land – to choose from a far wide range of work. Technology such as the PC; the Internet and cheap telecommunications have brought the PC; the Internet and cheap telecommunications have brought amazing mobility to the factors of production.”amazing mobility to the factors of production.”

Bill Gates, 1999Bill Gates, 1999 What about non-democratic countries?What about non-democratic countries?

Page 30: MELJUN CORTES Cyber Ethics

ISAT 615 30

Ethics and ProfessionalismEthics and Professionalism

““Engineers shall hold paramount the safety, health and Engineers shall hold paramount the safety, health and welfare of the public in the performance of their welfare of the public in the performance of their professional duties.”professional duties.”

Accreditation Board for Engineering and Technology (ABET)Accreditation Board for Engineering and Technology (ABET)

http://www.abet.org/http://www.abet.org/ Websites for general resources on Engineering Ethics:Websites for general resources on Engineering Ethics:

1.1. http://www.niee.orghttp://www.niee.org “National Institute for Engineering Ethics” “National Institute for Engineering Ethics”

2.2. http://www.nspe.orghttp://www.nspe.org “National Society of Professional Engineers” “National Society of Professional Engineers”

3.3. http://www.onlineethics.org/http://www.onlineethics.org/ “The online Ethics Center for “The online Ethics Center for Engineering and Science”Engineering and Science”

Page 31: MELJUN CORTES Cyber Ethics

ISAT 615 31

ReferencesReferences

Ingulli, Halbert, Cyber Ethics, West Thomas Ingulli, Halbert, Cyber Ethics, West Thomas Learning, 2002Learning, 2002

Martin, Mike W., Schinzinger, Roland, Ethics Martin, Mike W., Schinzinger, Roland, Ethics in Engineering, Fourth Edition, McGraw Hill, in Engineering, Fourth Edition, McGraw Hill, 20052005